Using computer systems to launch a terrorist attack is an example of which of the following?

A) Computer-based espionage
B) Information warfare
C) Cyber terrorism
D) Hacktivism

C) Cyber terrorism

Computer Science & Information Technology

You might also like to view...

If you use someone else's work without permission or credit and pass it off as your own work, you are ________ the work

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which option allows you to rotate text by 90 degrees?

A) Align Text B) Text Direction C) Text Rotate D) Text Diagonal

Computer Science & Information Technology